Dropbox Responds To Security Flap

After questions from a security researcher, Dropbox says that it opens links in uploaded documents in conjunction with the preview feature. Dropbox also is trying to address DDoS concerns.

9 Android Apps To Improve Security, Privacy

(click image for larger view)

Why has Dropbox been following links in uploaded documents?

That question surfaced Thursday after a security researcher found that links inside documents that he uploaded to the file-sharing service had been accessed. "I had the opportunity recently to beta-test HoneyDocs.com, a Web app that generates documents that can 'buzz home,'" wrote Daniel McCauley Thursday on WNC InfoSec Blog. "This is done by a unique embedded GET request that is initiated when the generated document has been opened."

The first "phone home" operation occurred just 10 minutes after McCauley uploaded a Zip file that contained a "sting" .doc file generated by HoneyDocs. The link-accessing activity traced to an IP address that appeared to be an Amazon EC-2 instance in Seattle, which listed "LibreOffice" in the HTTP user-agent header. "All in all, I made three attempts to upload embedded documents and all appeared to be opened from different Amazon instances," McCauley said, noting that the Dropbox infrastructure is also built to use Amazon S3 buckets.

It's well-known that Dropbox generates a checksum of uploaded files to allow the service to identify duplicates, so it only needs to store a single copy. But why would it be touching links inside those documents? "Several use cases came to mind, but I was most interested in seeing if my cloud storage services were manipulating my files in a way that I may not have been aware of," McCauley said.

Dropbox, however, quickly dismissed any security concerns, saying it was simply generating previews of uploaded documents. "Dropbox allows people to open and preview files from their browser," a company spokeswoman said Monday via email. She noted that the external resource loading behavior that McCauley observed relates to backend processes that automatically create these document previews, making it easier for users to view docs within their Dropbox.

McCauley likewise got that message. "Dropbox views/opens certain file types in order to convert them to a compatible format so they are easily accessible via Web browser for its users," he said in a follow-up post. "This makes sense and is common practice for many cloud storage services to provide the convenience of browser access while not needing any additional software to open these documents."

Even so, news of the link-checking feature quickly spawned related discussions about how the functionality might have information security or privacy repercussions if abused by attackers. "Could Dropbox perhaps let me disable this feature?" asked "Helium" on the Hackers News Site. "I almost never use the Web interface so I wouldn't miss it and I prefer that my documents are not opened after being synched."

Dropbox downplayed that possibility, but has promised to explore alternative approaches. "We do use LibreOffice to render previews of Office documents for viewing in a browser, and have permitted external resource loading to make those previews as accurate as possible," said Dropbox security team lead Andrew Bortz on Friday on Hacker News. "While this could theoretically be used for DDoS, we haven't seen any such behavior. However, just to be extra cautious we've temporarily disabled external resource loading while we explore alternatives."

The quick response is nice, but Dropbox really needs it--the past history isn't great (disabling auth for four hours; bad internal InfoSec with employees reusing passwords and storing customer information on Dropbox), and Dropbox is basically synonymous with "shadow IT" and all of the problems with the consumerization of IT.

Ultimately, Dropbox just wasn't built with InfoSec in mind, and certainly doesn't have the features that are necessary if you care about securing data in a shared environment. Anyone using Dropbox for confidential information is just asking for trouble.

If you want to add extra security to Dropbox then http://safeboxapp.com is worth considering. Safebox encrypts your content *before* it is synced to the cloud by Dropbox (disclaimer, I am on the Safebox development team). As a result Dropbox couldn't access your documents, even to create previews.

Dropbox have a problem in security as i found 2 GB data for unknown person on my dropbox and i contacted them about this problem but help me about know the main reason for this case but they didn't answer me.

Published: 2015-03-03Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

Published: 2015-03-03** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.